Matthieu Rivain

From MaRDI portal
(Redirected from Person:656513)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Masked circuit compiler in the cardinal random probing composability framework2026-03-31Paper
\texttt{Transistor}: a TFHE-friendly stream cipher2026-02-06Paper
New techniques for random probing security and application to Raccoon signature scheme2025-12-02Paper
Threshold linear secret sharing to the rescue of MPC-in-the-head2024-08-30Paper
Unifying freedom and separation for tight probing-secure composition
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Higher-order DCA against standard side-channel countermeasures
Constructive Side-Channel Analysis and Secure Design
2023-10-20Paper
Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Syndrome decoding in the head: shorter signatures from zero-knowledge proofs
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Dynamic random probing expansion with quasi linear asymptotic complexity
Lecture Notes in Computer Science
2023-05-12Paper
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature
Designs, Codes and Cryptography
2023-04-21Paper
Random probing security: verification, composition, expansion and new constructions2022-11-09Paper
On the power of expansion: more efficient constructions in the random probing model2021-12-08Paper
Tornado: automatic generation of probing-secure masked bitsliced implementations2021-12-01Paper
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
Constructive Side-Channel Analysis and Secure Design
2020-07-20Paper
Generalized polynomial decomposition for S-boxes with application to side-channel countermeasures
Lecture Notes in Computer Science
2020-06-24Paper
Tight private circuits: achieving probing security with the least refreshing2019-01-23Paper
How to securely compute with noisy leakage in quasilinear complexity2019-01-23Paper
Lattice attacks against elliptic-curve signatures with blinded scalar multiplication2018-02-16Paper
On the multiplicative complexity of Boolean functions and bitsliced higher-order masking2018-02-14Paper
Statistical Analysis of Second Order Differential Power Analysis
IEEE Transactions on Computers
2017-08-08Paper
How fast can higher-order masking be in software?
Lecture Notes in Computer Science
2017-06-13Paper
Algebraic decomposition for probing security
Lecture Notes in Computer Science
2015-12-10Paper
Two attacks on a white-box AES implementation
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
White-box security notions for symmetric encryption schemes
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Higher-order side channel security and mask refreshing
Fast Software Encryption
2015-09-18Paper
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Advanced Information Systems Engineering
2015-07-21Paper
On the practical security of a leakage resilient masking scheme
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
On double exponentiation for securing RSA against fault analysis
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
SCARE of secret ciphers with SPN structures
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Differential fault analysis of DES
Information Security and Cryptography
2013-07-09Paper
Masking against Side-Channel Attacks: A Formal Security Proof
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Conversion of security proofs from one leakage model to another: a new issue
Constructive Side-Channel Analysis and Secure Design
2013-02-14Paper
Higher-order masking schemes for S-boxes
Fast Software Encryption
2013-01-08Paper
Mutual information analysis: a comprehensive study
Journal of Cryptology
2012-01-18Paper
Theoretical and practical aspects of mutual information-based side channel analysis
International Journal of Applied Cryptography
2011-04-05Paper
Affine Masking against Higher-Order Side Channel Analysis
Selected Areas in Cryptography
2011-03-15Paper
Provably secure higher-order masking of AES
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Lecture Notes in Computer Science
2009-11-10Paper
Differential Fault Analysis on DES Middle Rounds
Lecture Notes in Computer Science
2009-11-10Paper
On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
Selected Areas in Cryptography
2009-11-03Paper
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Fast Software Encryption
2008-09-18Paper
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper


Research outcomes over time


This page was built for person: Matthieu Rivain